1.888.749.9800

Blog

  • Permalink Gallery

    Some Basic but Effective Advice for Secure Online Transactions

Some Basic but Effective Advice for Secure Online Transactions

Just about everybody shops online these days. Even so, many people worry about security issues and fraud.  I was recently asked if I could share some high-level tips and best practices for online transactions. Here is what I recommend:

  1. Try to consolidate all online purchases onto a single credit or debit card.  That way, you […]
By |March 10th, 2017|Blog|Comments Off on Some Basic but Effective Advice for Secure Online Transactions

How Big an Issue is Security; How can it be Addressed?

Other than the technology itself of an IoT device and the service it provides, the single most important characteristic that will define either success or failure, no matter what the size of the business, will be the security of that device.

The IoT is only in its infancy and yet there have already been an alarming […]

By |March 6th, 2017|Blog, Security Breach|Comments Off on How Big an Issue is Security; How can it be Addressed?

Impact of a Data Breach on a Small Business

While our main focus is as a provider of IT compliance and security consulting services, we have been called in to help a few small businesses handle security incidents and data breaches. These calls come to us after the client has discovered there’s been a security incident or data breach and as a result is seeking to […]

By |February 20th, 2017|Blog, Security Breach|Comments Off on Impact of a Data Breach on a Small Business

Importance of Following IT Security Policies

Just as in the 1980s when manufacturing companies recognized that quality was an attribute that had to baked into every facet of an organization (from design, production, delivery, and through product lifecycle), not inspected in at the end of the process, effective cyber security depends on every employee playing a part in keeping the enterprise secure.

The most sophisticated and […]

By |February 6th, 2017|Blog|Comments Off on Importance of Following IT Security Policies

IoT Security Nightmares

At the same time that consumers and manufacturers are getting excited about the potential opportunities, capabilities, and revenue that the Internet of Things (IoT) enhanced devices can offer, many are already starting to understand the frightening lack of essential security functionality and the potentially overwhelming opportunities for exploitation.

The IoT is only in its infancy and […]

By |January 23rd, 2017|Blog|Comments Off on IoT Security Nightmares
  • Permalink Gallery

    Why it is Important for Companies to Invest in Cybersecurity Awareness Training

Why it is Important for Companies to Invest in Cybersecurity Awareness Training

Technology is only as effective as the people that operate it.

Cybersecurity awareness training is the most cost effective investment any organization can make in preventing data breaches, system compromise, reputational damage, and loss of intellectual property.

No one is born knowing how to use computers and networks securely. There are basic dos and don’ts […]

By |January 17th, 2017|Blog, Security Breach|Comments Off on Why it is Important for Companies to Invest in Cybersecurity Awareness Training

How are Hackers Tricking Social Media Users?

One of the most popular exploitation methods used by hackers when targeting social media users is social engineering. Using confidence tricks, a hacker can manipulate his target into performing actions or disclosing confidential information. If pulled off successfully, a social engineering attack could result in a hacker gaining complete access to its target’s social media account with little effort.

One […]

By |December 20th, 2016|Blog|Comments Off on How are Hackers Tricking Social Media Users?

What Exactly Does the Future of IoT Security Hold?

Picking up on the conversation from my previous post, the Internet of Things continues to pose challenges for many manufactures as they now have to think about network security for new versions of their products.

One of the worries about the future of the Internet of Things (IoT) is that many of the manufactures that are […]

By |December 12th, 2016|Blog, Security Breach|Comments Off on What Exactly Does the Future of IoT Security Hold?

Security Implications of Connected Consumer Electronics

I’d like to pose a question: What do you think the security implications of connecting various popular IoT consumer electronic devices is?

A) No harder than it was for other new devices like laptops, wireless connections and smartphones, or

B) No easier than it was for previous new devices.

The answer is […]

By |November 30th, 2016|Blog, Security Breach|Comments Off on Security Implications of Connected Consumer Electronics

Risks of Plugging a Smartphone Into a Public USB Port

As smartphones continue to increase in popularity, people can find USB charging stations in almost any location. From airports to malls, businesses are offering their customers a convenient way to keep a full charge. Without much thought, most people are quick to plug their devices into any random USB port that they might find, but doing so […]

By |November 14th, 2016|Blog, Security Breach|Comments Off on Risks of Plugging a Smartphone Into a Public USB Port

Social Media Security Tips and Best Practices

In response to a recent query about security pitfalls surrounding social media, Jonathan Shuffler and I came up with the following tips and best practices:

  • When setting account security questions, do not use real answers.  A lot of security questions ask publicly available information, e.g., What is your favorite sports team?  An attacker would need only a […]
By |October 31st, 2016|Blog|Comments Off on Social Media Security Tips and Best Practices
  • Permalink Gallery

    Important Tip for Companies Looking to Protect Unstructured Data

Important Tip for Companies Looking to Protect Unstructured Data

Most companies are very good at protecting data that they know about and consider sensitive – they restrict access to the HR systems where compensation data is available.  They put access controls and monitoring procedures on systems that store critical intellectual property like formulas or key financial analytics.

Typically, they have formal policies and associated technology […]

By |October 19th, 2016|Blog, Security Breach|Comments Off on Important Tip for Companies Looking to Protect Unstructured Data

Important Sources of Threat Intelligence for Security Teams

The goal of threat intelligence (TI) is to recognize indicators of attacks as they progress and act upon those indicators in a timely manner. TI is not a mature area for most organizations.

While tools to automate TI exist and are evolving, most organizations are still using informal ad hoc mechanisms or a small number […]

By |September 26th, 2016|Blog, Security Breach|Comments Off on Important Sources of Threat Intelligence for Security Teams

Cybersecurity Responsibilities for SMBs

Cybersecurity is a topic that many small and most medium-sized businesses care about due to all of the news stories about data breaches, identity theft, and ransomware that have appeared in the last several years.  Some small and medium-sized businesses have realized that having a strong cybersecurity program can be a strategic asset for their particular market […]

By |September 9th, 2016|Blog, Security Breach|Comments Off on Cybersecurity Responsibilities for SMBs

Cybersecurity by Segregation

With recent news of Singapore disconnecting its government networks from internet access, and now requiring civil servants to use separate computers, I was asked to comment on the security issues this cybersecurity segregation will cause.

Deciding to disconnect from the Internet is clearly a difficult decision and more than likely a result of a reaction to […]

By |August 23rd, 2016|Blog, Security Breach|Comments Off on Cybersecurity by Segregation